You Won’t Believe the Most Evil Domains on the Internet
Have you ever wondered which websites on the Internet are the most dangerous? Recently it’s been discovered that the majority of threatening websites on the Internet fall into some very easy-to-identify categories; or, more specifically, about 95 percent of all dangerous websites are found on ten top-level domains.
The study, which was performed by Blue Coat, came to this conclusion following a close analysis of tens of millions of websites visited by Blue Coat’s users. Blue Coat keeps a database that ranks websites on how secure or prone to threats they are compared to others; in other words, how many of them are actual sites dedicated to providing great content for their users, and how many of them are basically just hotbeds of malware, spam, spyware, phishing attacks, and other activity that’s dangerous to the user.
For those who are unfamiliar with the terminology related to top-level domains, it’s the part of a link’s URL that appears at the end of it. For example, .com and .net would be considered top-level domains. There are now a total of 1,054 top-level domains in existence now, but the majority of the dangerous domains account for less than 1 percent of all site registrations. Still, it never hurts to be cautious of the sites your employees access on your business’s Internet connection.
For your reference, here are the top ten domains cited as being threatening to its visitors:
- .zip: 100% evil, <1,000 domains
- .review: 100% evil, 45,304 domains
- .country: 99.97% evil, 5,442 domains
- .kim: 99.74% evil, 8,913 domains
- .cricket: 99.57% evil, 27,723 domains
- .science: 99.35% evil, 324,833 domains
- .work: 98.20% evil, 68,144 domains
- .party: 98.07% evil, 206,914 domains
- .gq (Equatorial Guinea): 97.68% evil, 69,437 domains
- .link: 96.98% evil, 150,595 domains
With so many threats on the Internet, how do you keep your business’s network safe? An ordinary firewall and antivirus solution isn’t enough to mitigate the immense amount of dangerous entities that are found on the Internet, and you can’t count on your employees to identify spam and phishing scams when they need to.
In order to guarantee that your business’s network security policies are protecting you from as many threats as possible, including those found on sketchy websites, a Unified Threat Management (UTM) solution is ideal. The UTM can secure your business from all manners of dangerous web activity, and includes an enterprise-level firewall, antivirus, spam-blocking, and content filtering solutions to maximize network security. Give us a call at 603-889-0800 to learn more.
- Getting to Know Technology: Hackers It doesn’t matter how much of a technology novice someone is, chances are, they’ve heard the term “hacker” before. A favorite character trope of Hollywood films and television dramas, these cybercriminals have appeared in productions like Die Hard and Mr. Robot with varying degrees of accuracy. Belo...
- Could Your Router be Infected with Malware? Certain threats out there are dangerous enough to cause major entities to warn against them. In particular, a recent malware by the name of VPNFilter has been deemed dangerous and prevalent enough that the FBI has addressed it. Since the malware targets routers (probably not your first guess in term...
- Virginia To Upgrade Voting Machines. Hopefully Other States ... The 2016 United States presidential election was an ugly one for multiple reasons--chief among them the accusation that hacked voting machines could have altered the outcome of the election significantly. Thankfully, there are steps being taken to alleviate the worries that third parties might alter...
- Do not Let Hollywood Fool You Into Thinking Hackers are the ... There’s no question about it; hackers make things difficult for businesses of all industries and sizes. They go out of their way to steal data and turn a profit off of it, as well as misrepresent organizations and individuals. The business environment is chaotic enough without hackers mucking everyt...
- A New Concept Might Take Reverse-Engineering to the Next Lev... Even the most innocent Internet user can fall victim to the stray hacking attack, and it’s all thanks to the manner in which malware reverse-engineers software. This process is how a hacker finds vulnerabilities in software. However, a new security concept might be able to protect software from the ...
- Alert: Users of 7-Zip Should Immediately Upgrade to the Late... One of the latest vulnerabilities in open-source software can be found in 7zip, a file archiver and decompresser. 7zip has been found to have several security vulnerabilities which have software developers rushing to fix their products. The damage done extends far beyond 7zip, reaching both people w...